Processing ......
Links to Free Computer, Mathematics, Technical Books all over the World
Digital and Computer Forensics, Forensic Science, Steganography, Watermarking, Nmap, etc.
Related Book Categories:
  • Forensic Discovery (Dan Farmer, et al)

    This book covers both theory and hands-on practice of computer forensics, introducing a powerful approach that can often recover evidence considered lost forever. It covers everything from file systems, to memory and kernel hacks, to malware.

  • Digital Forensics (Jeetendra Pande, et al)

    The definitive text for Digital Forensics, as well as professionals looking to deepen their understanding of an increasingly critical field. It takes a scientific approach to digital forensics and information security.

  • Multimedia Forensics (Husrev Taha Sencar, et al)

    Media forensics has never been more relevant to societal life. This book presents a comprehensive review of state-of-the-art forensics capabilities that relate to media attribution, integrity and authenticity verification, and counter forensics.

  • Handbook of Forensic Science (FBI)

    This book seeks to familiarize the investigator with these techniques and to make known the capabilities and the limitations of the crime laboratory. It is a vital element in our criminal justice system.

  • Mobile Forensics - The File Format Handbook

    It summarizes knowledge about several file systems and file formats commonly used in mobile devices. The aim is to act as a knowledge base and reference guide for digital forensic practitioners who need knowledge about a specific file system or file format.

  • Bayes Factors for Forensic Decision Analyses with R

    This book provides a self-contained introduction to computational Bayesian statistics using R programming language. With its primary focus on Bayes factors supported by data sets, this book features an operational perspective, practical relevance, and applicability.

  • Hacking Exposed Computer Forensics (Aaron Philipp, et al)

    This book explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents.

  • Multimedia Fingerprinting Forensics for Traitor Tracing (K.J. Liu)

    This book describes the framework of multimedia fingerprinting by providing readers with a broader view of the evolution of the young field of multimedia forensics. It covers the essential aspects of research in this emerging technology.

  • Finger Prints (Sir Francis Galton)

    Landmark discusses the evidence validating fingerprints as a means of personal identification, permanence of the fingerprint characteristics, uniqueness of an assemblage of ridge details, and the variability and classifiable nature of finger patterns.

  • Natural Image Statistics in Digital Image Forensics (Siwei Lyu)

    This book provides the first general framework, based on universal statistical properties of natural images, of detecting tampering and authenticating digital images that has been successfully applied to three problems in digital image forensics.

  • Handbook of Digital Face Manipulation and Detection

    This open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, Face Morphing, or Reenactment. It combines the both biometrics and media forensics fields.

  • Portraits of Automated Facial Recognition (Lila Lee-Morrison)

    Automated facial recognition algorithms are increasingly intervening in society. This book offers a unique analysis of these algorithms from a critical visual culture studies perspective.

  • Forensic Medicine - From Old Problems to New Challenges

    This book contains innovative perspectives and approaches to classic topics and problems in forensic medicine, offering reflections about the potential and limits of emerging areas in forensic expert research.

  • Concise Textbook Forensic Medicine Toxicology (R.K. Sharma, et al)

    Designed to provide the reader essential and practical knowledge of forensic medicine, this book has been written in a concise manner to help the students get a grasp of the subject. Very informative with latest development in forensic.medicine.

  • Textbook of Forensic Medicine and Toxicology (N. G. Rao)

    This book is a comprehensive book for undergraduate students of Forensic sciences. It would also be useful for students pursuing carrers in a ayurvedic, homoeopathic, unani and siddha systems of medicine.

  • Strengthening Forensic Science in the United States: A Path Forward

    This book shows changes and advancements in both systematic and scientific fields, provides a detailed plan for addressing these needs to establish and enforce standards within the forensic science community.

  • Visual Cryptography and Its Applications (Jonathan Weir, et al)

    In this book, one of the data security methods known as Visual Cryptography (VC) is presented. Many types of visual cryptography are examined. From the very first type of traditional visual cryptography right up to the latest developments.

  • Recent Advances in Steganography (Hedieh Sajedi)

    This book focus is on a relatively new field of study in Steganography and it takes a look at this technology by introducing the readers various concepts of Steganography and Steganalysis.

  • Algorithms for Audio Watermarking and Steganography

    The main results of this book are the development of novel audio watermarking algorithms, with the state-of-the-art performance and an acceptable increase in computational complexity.

  • Image Steganography and Steganalysis (Philip Bateman)

    This book describes image steganography algorithms, which are primarily based on restoring the statistics of a image after embedding data in them which results in low detection rate as compared to other existing algorithms.

  • Watermarking - Volume 1 (Mithun Das Gupta)

    This collection of two books brings some of the latest developments in the field of watermarking. Book one is more traditional in its approach dealing mostly with image watermarking applications.

  • Watermarking - Volume 2 (Mithun Das Gupta)

    This collection of two books brings some of the latest developments in the field of watermarking. Book two deals with audio watermarking and describes an array of chapters on performance analysis of algorithms.

  • Nmap Network Scanning: The Official Nmap Guide

    This book is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. A reference guide documents every Nmap feature and option.

  • Nmap Cookbook: The Fat-Free Guide to Network Security Scanning

    This book provides simplified coverage of network scanning features available in the Nmap suite of utilities. Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results.

  • Secrets of Network Cartography: A Comprehensive Guide to Nmap

    In this book, thirteen different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Each scan method includes graphical scan descriptions and packet-by-packet analysis!

Book Categories
Other Categories
Resources and Links